메뉴 건너뛰기




Volumn 74, Issue 1-2, 2008, Pages 2-12

ConSpec - A formal language for policy specification

Author keywords

Policy language; Runtime monitoring; Security enforcement mechanisms; Security frameworks

Indexed keywords

FORMAL LANGUAGES; FORMAL METHODS; INFORMATION THEORY; SEMANTICS; SPECIFICATIONS; TRANSLATION (LANGUAGES);

EID: 56349132805     PISSN: 01676423     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.scico.2008.09.004     Document Type: Article
Times cited : (36)

References (19)
  • 1
    • 47249101556 scopus 로고    scopus 로고
    • I. Aktug, M. Dam, D. Gurov, Provably correct runtime monitoring, in: Proceedings of the 15th International Symposium on Formal Methods, FM'08, in: Lecture Notes in Computer Science, vol. 5014, Turku, Finland, May 2008, pp. 262-277
    • I. Aktug, M. Dam, D. Gurov, Provably correct runtime monitoring, in: Proceedings of the 15th International Symposium on Formal Methods, FM'08, in: Lecture Notes in Computer Science, vol. 5014, Turku, Finland, May 2008, pp. 262-277
  • 2
    • 31844457357 scopus 로고    scopus 로고
    • L. Bauer, J. Ligatti, D. Walker, Composing security policies with Polymer, in: Proc. of the ACM SIGPLAN Conf. on Prog. Lang. Design and Implementation, 2005, pp. 305-314
    • L. Bauer, J. Ligatti, D. Walker, Composing security policies with Polymer, in: Proc. of the ACM SIGPLAN Conf. on Prog. Lang. Design and Implementation, 2005, pp. 305-314
  • 3
    • 66849138438 scopus 로고    scopus 로고
    • L. Bauer, J. Ligatti, D. Walker, Composing expressive run-time security policies, ACM Transactions on Software Engineering and Methodology, 2008 (in press)
    • L. Bauer, J. Ligatti, D. Walker, Composing expressive run-time security policies, ACM Transactions on Software Engineering and Methodology, 2008 (in press)
  • 5
    • 56349168167 scopus 로고    scopus 로고
    • N. Dragoni, F. Massacci, K. Naliuka, I. Siahaan, Security-by-contract: Toward a semantics for digital signatures on mobile code, in: European PKI Workshop: Theory and Practice, 2007 (in press)
    • N. Dragoni, F. Massacci, K. Naliuka, I. Siahaan, Security-by-contract: Toward a semantics for digital signatures on mobile code, in: European PKI Workshop: Theory and Practice, 2007 (in press)
  • 6
    • 56349170935 scopus 로고    scopus 로고
    • Ú. Erlingsson, The inlined reference monitor approach to security policy enforcement, Ph.D. Thesis, Dep. of Computer Science, Cornell University, 2004
    • Ú. Erlingsson, The inlined reference monitor approach to security policy enforcement, Ph.D. Thesis, Dep. of Computer Science, Cornell University, 2004
  • 9
    • 18944390941 scopus 로고    scopus 로고
    • The model checker SPIN
    • Holzmann G.J. The model checker SPIN. Software Engineering 23 5 (1997) 279-295
    • (1997) Software Engineering , vol.23 , Issue.5 , pp. 279-295
    • Holzmann, G.J.1
  • 10
    • 26444441275 scopus 로고
    • On the equivalence and containment problems for context-free languages
    • Hopcroft J.E. On the equivalence and containment problems for context-free languages. Theory of Computing Systems 3 2 (1969) 119-124
    • (1969) Theory of Computing Systems , vol.3 , Issue.2 , pp. 119-124
    • Hopcroft, J.E.1
  • 11
    • 84976739235 scopus 로고
    • On equivalence and containment problems for formal languages
    • Hunt H.B., and Rosenkrantz D.J. On equivalence and containment problems for formal languages. Journal of ACM 24 3 (1977) 387-396
    • (1977) Journal of ACM , vol.24 , Issue.3 , pp. 387-396
    • Hunt, H.B.1    Rosenkrantz, D.J.2
  • 12
    • 84957836728 scopus 로고
    • A decision algorithm for full propositional temporal logic
    • Kesten Y., Manna Z., McGuire H., and Pnueli A. A decision algorithm for full propositional temporal logic. CAV (1993) 97-109
    • (1993) CAV , pp. 97-109
    • Kesten, Y.1    Manna, Z.2    McGuire, H.3    Pnueli, A.4
  • 13
    • 13444275220 scopus 로고    scopus 로고
    • Edit automata: Enforcement mechanisms for run-time security policies
    • (Published online 26 Oct 2004)
    • Ligatti J., Bauer L., and Walker D. Edit automata: Enforcement mechanisms for run-time security policies. International Journal of Information Security 4 1-2 (2005) 2-16 (Published online 26 Oct 2004)
    • (2005) International Journal of Information Security , vol.4 , Issue.1-2 , pp. 2-16
    • Ligatti, J.1    Bauer, L.2    Walker, D.3
  • 14
    • 56349092028 scopus 로고    scopus 로고
    • F. Massacci, I. Siahaan, Matching midlet's security claims with a platform security policy using automata modulo theory, in: in Proc. of The 12th Nordic Workshop on Secure IT Systems, NordSec'07, October 2007
    • F. Massacci, I. Siahaan, Matching midlet's security claims with a platform security policy using automata modulo theory, in: in Proc. of The 12th Nordic Workshop on Secure IT Systems, NordSec'07, October 2007
  • 18
    • 46049083056 scopus 로고    scopus 로고
    • D. Vanoverberghe, F. Piessens, A caller-side inline reference monitor for an object-oriented intermediate language, in: Proc. of the 10th IFIP International Conference on Formal Methods for Open Object-based Distributed Systems, FMOODS'08, Oslo, Norway, June 4-6, 2008, in: Lecture Notes in Computer Science, vol. 5051, Springer, 2008, pp. 240-258
    • D. Vanoverberghe, F. Piessens, A caller-side inline reference monitor for an object-oriented intermediate language, in: Proc. of the 10th IFIP International Conference on Formal Methods for Open Object-based Distributed Systems, FMOODS'08, Oslo, Norway, June 4-6, 2008, in: Lecture Notes in Computer Science, vol. 5051, Springer, 2008, pp. 240-258
  • 19
    • 56349110601 scopus 로고    scopus 로고
    • A. Zobel, C. Simoni, D. Piazza, X. Nunez, D. Rodriguez, Business case and security requirements, Public Deliverable D5.1.1, S3MS. http://s3ms.org, October 2006
    • A. Zobel, C. Simoni, D. Piazza, X. Nunez, D. Rodriguez, Business case and security requirements, Public Deliverable D5.1.1, S3MS. http://s3ms.org, October 2006


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.